Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/Threats/GhostChat Spyware Steals Sensitive Android Data via WhatsApp
Threats

GhostChat Spyware Steals Sensitive Android Data via WhatsApp

A new Android spyware campaign has emerged, directly targeting users in Pakistan. This sophisticated operation leverages romance scams and fake dating profiles to illicitly acquire personal...

Jennifer sherman
Jennifer sherman
January 30, 2026 3 Min Read
3 0

A new Android spyware campaign has emerged, directly targeting users in Pakistan. This sophisticated operation leverages romance scams and fake dating profiles to illicitly acquire personal information.

The malicious application, known as GhostChat, disguises itself as a legitimate chat platform while secretly running surveillance operations in the background.

This attack represents a dangerous trend where cybercriminals combine social engineering tactics with advanced spyware capabilities to compromise mobile devices and access sensitive data.

The spyware campaign was discovered after a suspicious Android application was uploaded to VirusTotal from Pakistan in September 2025. GhostChat masquerades as a dating app called “Dating Apps without payment,” using the icon of a legitimate application available on Google Play.

However, the malicious version has never been distributed through official app stores, requiring victims to manually install it by enabling permissions for apps from unknown sources.

This distribution method helps the threat actors avoid detection by Google Play Protect during the initial installation phase.

Welivesecurity analysts noted that GhostChat employs an unusual layer of deception that sets it apart from typical mobile threats. The app presents 14 fake female profiles, each marked as “Locked” and requiring passcodes to access.

These codes are hardcoded within the application and distributed alongside the app to create an illusion of exclusive access for potential victims.

Once a victim enters the correct unlock code, they are redirected to WhatsApp to initiate conversations with numbers operated by the threat actors, all bearing Pakistani country codes to enhance the scam’s credibility.

GhostChat attack flow (Source - Welivesecurity)
GhostChat attack flow (Source – Welivesecurity)

While victims engage with what they believe are real dating profiles, the spyware operates silently in the background, exfiltrating device data to a command-and-control server.

The malware immediately collects device identifiers, contact lists, and files stored on the device including images, PDFs, and Microsoft Office documents.

GhostChat establishes continuous surveillance by setting up content observers that monitor newly created images and scheduling periodic scans every five minutes to detect new documents, ensuring ongoing data harvesting throughout the infection period.

Infection Mechanism and Persistence Tactics

GhostChat demonstrates sophisticated infection and persistence mechanisms designed to maintain long-term access to compromised devices.

WhatsApp numbers, names, ages, and codes linked to each profile (Source - Welivesecurity)
WhatsApp numbers, names, ages, and codes linked to each profile (Source – Welivesecurity)

Upon installation, the application requests multiple permissions that appear standard for a chat application but actually enable extensive surveillance capabilities.

The spyware leverages Android’s BOOT_COMPLETED broadcast intent, allowing it to automatically activate whenever the device restarts, ensuring persistent operation even after reboots.

Overview of the related activities revealed by the investigation (Source - Welivesecurity)
Overview of the related activities revealed by the investigation (Source – Welivesecurity)

The malware employs foreground persistence techniques to keep its surveillance service continuously running without user awareness.

This method prevents Android’s battery optimization features from terminating the spyware process, maintaining uninterrupted access to device resources.

The application communicates with its command-and-control infrastructure using HTTPS requests, making detection more difficult as the traffic appears similar to legitimate encrypted communications.

GhostChat’s architecture supports both immediate data exfiltration upon first execution and sustained monitoring throughout the infection lifecycle, creating a comprehensive surveillance framework that operates independently of user interaction with the fake dating interface.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Critical Ivanti Endpoint Manager 0-Day RCE Vulnerabilities Actively

Next Post

Attackers Exploit Hugging Face Hosting for Android RAT Payload

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us